𝔖 Bobbio Scriptorium
✦   LIBER   ✦

New visual secret sharing schemes using probabilistic method

✍ Scribed by Ching-Nung Yang


Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
498 KB
Volume
25
Category
Article
ISSN
0167-8655

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


An extended construction method for visu
✍ Taku Katoh; Hideki Imai πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 348 KB

A visual secret sharing scheme permits a secret to be shared among participants using transparencies. In this paper, we consider an extended scheme for visual secret sharing. We propose an improved method of constructing the visual secret sharing scheme that can conceal some images in a series of t

Generation of Key Predistribution Scheme
✍ GermΓ‘n SΓ‘ez πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 532 KB

In a key predistribution scheme a trusted authority distributes pieces of information among a set of users in such a way that speci ed privileged subsets of users can compute a secret key individually. In such a scheme, a family of forbidden subsets of users cannot obtain any information about the v

New combinatorial designs and their appl
✍ Wakaha Ogata; Kaoru Kurosawa; Douglas R. Stinson; Hajime Saido πŸ“‚ Article πŸ“… 2004 πŸ› Elsevier Science 🌐 English βš– 306 KB

This paper introduces three new types of combinatorial designs, which we call external difference families (EDF), external BIBDs (EBIBD) and splitting BIBDs. An EDF is a special type of EBIBD, so existence of an EDF implies existence of an EBIBD. We construct optimal splitting A-codes by using EDF.

An efficient multi-use multi-secret shar
✍ Angsuman Das; Avishek Adhikari πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 244 KB

In this work, a renewable, multi-use, multi-secret sharing scheme for general access structure based on the one-way collision resistant hash function is presented in which each participant has to carry only one share. As it applies the collision resistant oneway hash function, the proposed scheme is

Electromagnetic-wave visualization for E
✍ Hitoshi Kitayoshi; Kunio Sawaya πŸ“‚ Article πŸ“… 1999 πŸ› John Wiley and Sons 🌐 English βš– 252 KB πŸ‘ 1 views

This paper discusses a method in which a wave source is visualized by electromagnetic wave holography by scanning the receiver antenna on a plane. The method presented in this paper does not use the Fresnel approximation or the Fraunhofer approximation, and there is no constraint on the distance bet